Checkmarx / red-lili
This open-source project tracks RED-LILI's activity over time as there are evidence the actor is still active. All information provided here is intended for research purposes.
☆11Updated last year
Alternatives and similar repositories for red-lili
Users that are interested in red-lili are comparing it to the libraries listed below
Sorting:
- Dependency Combobulator☆93Updated last year
- Lab that will help you to understand how type juggling vulnerability works.☆22Updated 4 years ago
- A collection of my Semgrep rules☆49Updated last year
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- CVE.ICU code.☆42Updated this week
- Maturity Model Collaborative project☆15Updated 2 years ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆23Updated 2 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆20Updated 4 years ago
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆40Updated this week
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 3 years ago
- Burp Suite extension for Radamsa-powered fuzzing with Intruder☆20Updated 3 years ago
- Kaze's openly available CVE vulnerability data.☆13Updated last month
- CveXplore☆38Updated last month
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Static Token And Credential Scanner☆96Updated 2 years ago
- A tool for auditing medical devices and healthcare infrastructure☆20Updated 2 years ago
- Adds extensibility to Burp by using a list of payloads to pattern match on HTTP responses highlighting interesting and potentially vulner…☆15Updated last year
- Manager of third-party sources of Semgrep rules 🗂☆82Updated 9 months ago
- A simple way to exfiltrate data using spotify API☆18Updated last week
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Updated 4 years ago
- A regular expression fuzzer.☆43Updated 7 years ago
- Bot per leggere i livelli idrometrici dei fiumi dell'Emilia Romagna riportati da allertameteo.regione.emilia-romagna.it.☆12Updated last week
- Virtual Security Operations Center☆50Updated last year
- Python Package for burprestapi☆16Updated 5 years ago
- Collection of python helper API's for interacting with LGTM.com in ways the official API doesn't support.☆24Updated 3 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆22Updated 3 years ago
- AWS Security Checks☆39Updated 7 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆51Updated 2 weeks ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 2 months ago
- Scrap Latest Information Security Resources☆32Updated 4 years ago